netrc man page on HP-UX

Man page or keyword search:  
man Server   10987 pages
apropos Keyword Search (all sections)
Output format
HP-UX logo
[printable version]

netrc(4)							      netrc(4)

NAME
       netrc: .netrc - login information for ftp, rexec, and rexec()

DESCRIPTION
       The  file  contains  login  and	initialization information used by the
       autologin process, by the library routine,  and	by  the	 command  (see
       ftp(1), rexec(3N), and remsh(1)), respectively.	This file is optional.
       It exists, if at all, in the user's home directory.

       If the file contains password or account information for use other than
       for anonymous its owner must match the effective user ID of the current
       process.	 Its read, write, and execute mode bits for  group  and	 other
       must all be zero, and it must be readable by its owner.	Otherwise, the
       file is ignored.

       The file can contain the	 following  tokens,  separated	by  whitespace
       (spaces,	 tabs,	or newlines) or commas To include a comma as part of a
       token, enclose that token in quotation marks ().

       Identify a remote machine name.
			   The autologin process searches the file for a token
			   that	 matches  the  remote machine specified on the
			   command line, as an command	argument,  or  as  the
			   parameter  of  Once a match is made, the subsequent
			   tokens are processed, stopping when the end-of-file
			   is  reached	or another token or a token is encoun‐
			   tered.

			   If the remote machine name has an alias host	 name,
			   and	both  the official host name and the alias are
			   present in the file, the client gives precedence to
			   the	official host name over the alias when search‐
			   ing the file.  If an alias is given as an entry  to
			   the	command, and in the search from the top of the
			   file to the bottom, the client finds the alias host
			   name	 before	 it  finds  the official host name, it
			   will use the alias's entry.	However, if  it	 finds
			   the official host name first, it will use the offi‐
			   cial entry even though the  alias  host  name  also
			   exists  in  the file.  So the high precedence given
			   to the official  host  name	requires  placing  the
			   official  host name entry last in the file for when
			   aliases exist.

       Same as		   except that matches any name.  There	 can  be  only
			   one	token,	and it must be after all tokens.  This
			   is normally used for as follows:

			   This provides automatic anonymous login to machines
			   not specified in This can be overridden in by using
			   the flag to disable autologin.

       Identify a user on the remote machine.
			   If this token is present, the or autologin  process
			   initiates  a	 login	using  the specified name.  If
			   this token matches the user name used by  the  com‐
			   mand	 option,  or, by default, the local user name,
			   uses the token, if present.

       Supply a password.  If this token is  present,  the  autologin  process
			   supplies the specified string, if the remote server
			   requires a password as part of the  login  process.
			   Note	 that if this token is present in the file for
			   any user other than aborts the autologin process if
			   the	is  readable  by  anyone other than the owner.
			   Also note that the passwords in are not encrypted.

       Supply an additional account password for
			   login.  If this token  is  present,	the  autologin
			   process supplies the specified string if the remote
			   server requires an additional account password,  or
			   the	autologin  process  initiates an command if it
			   does not.

       Define an	   macro.  This token is just  like  the  command.   A
			   macro  is defined with the specified name; its con‐
			   tents begin with the next line and  continue	 until
			   an  empty  line (consecutive newline characters) is
			   encountered.	 If a macro named is  defined,	it  is
			   automatically  executed  as	the  last  step in the
			   autologin process.

EXAMPLES
       The following is a valid entry for the host whose account has the pass‐
       word

WARNINGS
       It is a security risk to have unencrypted passwords in a file.

AUTHOR
       was developed by the University of California, Berkeley.

FILES
SEE ALSO
       ftp(1), remsh(1), rexec(3N).

								      netrc(4)
[top]

List of man pages available for HP-UX

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net